Analysis

  • max time kernel
    152s
  • max time network
    187s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 03:14

General

  • Target

    b734513856cffb0fb23b1428ade343c64686d874102410fa63fd1834d3424174.exe

  • Size

    176KB

  • MD5

    11bceb9ab14ba81aca66bcdc727de5a9

  • SHA1

    987a61615082c32ebdc385df4e4c391e0b222ddb

  • SHA256

    b734513856cffb0fb23b1428ade343c64686d874102410fa63fd1834d3424174

  • SHA512

    aa0afab50974e18157852b778c5b283720bcbac881a7977f7aba752c50a42d86ba48968403c318a08480cbb9e11e6a629847f87356f7e8222783934354be69bc

  • SSDEEP

    3072:wfXiCdKZCsJB/pAYsmyCMuKnvmb7/D26ADS6eS6EjzXLG47JTmcoiBuAZdV:ySCkCsJB/pxKnvmb7/D26Ae6eS6wzXLB

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b734513856cffb0fb23b1428ade343c64686d874102410fa63fd1834d3424174.exe
    "C:\Users\Admin\AppData\Local\Temp\b734513856cffb0fb23b1428ade343c64686d874102410fa63fd1834d3424174.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4032
    • C:\Users\Admin\suuseh.exe
      "C:\Users\Admin\suuseh.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2132

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\suuseh.exe

          Filesize

          176KB

          MD5

          c2df8e9ca458b1e1946726f9b93008ed

          SHA1

          e15f444463723868992b5d28c4e8c3b2feffab6a

          SHA256

          4602cc68d0a03d3a02d15acfe5a392fbb8d7475aebbb9b957bb3c5c9f42d8660

          SHA512

          a97d3d9a7a9d48a54e3245718a5ac6f631ed7174ee74931d37ad499fa6ad87a64571170086013c6dc657a94daba227a0d6b3045c22c48ec72d88ae5f89e06889

        • C:\Users\Admin\suuseh.exe

          Filesize

          176KB

          MD5

          c2df8e9ca458b1e1946726f9b93008ed

          SHA1

          e15f444463723868992b5d28c4e8c3b2feffab6a

          SHA256

          4602cc68d0a03d3a02d15acfe5a392fbb8d7475aebbb9b957bb3c5c9f42d8660

          SHA512

          a97d3d9a7a9d48a54e3245718a5ac6f631ed7174ee74931d37ad499fa6ad87a64571170086013c6dc657a94daba227a0d6b3045c22c48ec72d88ae5f89e06889